IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
27 Feb 2024
Majority of UK employees ‘willingly gamble’ with security
Human-centric threats originating from employees continue to damage organisations both financially and reputationally, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Feb 2024
Executive interview: David Wong, Thomson Reuters
We speak to the chief product officer of Thomson Reuters about working with artificial intelligence and embedding Microsoft Copilot for Word Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
27 Feb 2024
OpenSSL
OpenSSL is an open source cryptographic toolkit that facilitates secure communications between endpoints on a network. Continue Reading
-
News
27 Feb 2024
Hycu uses AI to develop APIs for SaaS application backup
SaaS applications don’t usually come with built-in data protection, but Hycu plans to tackle that gap in the market with AI to generate the connectors needed to backup user data Continue Reading
By- Yann Serra, LeMagIT
- Antony Adshead, Storage Editor
-
Definition
27 Feb 2024
computer forensics (cyber forensics)
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Continue Reading
By- Rahul Awati
- Ben Lutkevich, Site Editor
-
News
27 Feb 2024
Microsoft president commits to Azure open platform for AI
Brad Smith sets out Microsoft’s ambitions to make Azure the best platform to host foundational AI models, and train and run AI applications Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Feb 2024
Cozy Bear and other APTs changing tack as cloud adoption increases
A change in APT tactics has been observed resulting from greater adoption of cloud-based services, according to the NCSC Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2024
LockBit bids to save face after NCA takedown
The LockBit gang’s ringleader resurfaces with new infrastructure and new victims, claiming to have shrugged off a multinational police sting Continue Reading
By- Alex Scroxton, Security Editor
-
News
26 Feb 2024
Storage and backup spend in 2024 targets risk and resilience
The TechTarget and ESG spending intentions survey finds big bias towards averting risk and building organisational resilience, but on-premise storage a significant planned outlay Continue Reading
By- Antony Adshead, Storage Editor
-
News
23 Feb 2024
ConnectWise users see cyber attacks surge, including ransomware
ConnectWise ScreenConnect users who have yet to patch against a critical vulnerability are now being targeted by a barrage of cyber attacks, including ransomware Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Feb 2024
NCA trolls under fire LockBit gang leaders
The NCA has teased details of the identity of LockBit's main admin via the gang’s compromised dark web site, and hinted that he has been engaging with law enforcement Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
23 Feb 2024
LLMs explained: A developer’s guide to getting started
A guide to help enterprise developers use large language models securely, efficiently and cost-effectively in their applications Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Feb 2024
Cyber experts alarmed by ‘trivial’ ConnectWise vulns
The disclosure of two dangerous vulnerabilities in the popular ConnectWise ScreenConnect product is drawing comparisons with major cyber incidents, including the 2021 Kaseya attack Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
22 Feb 2024
How can we adapt work practices to protect CISO mental health?
Cyber leaders are finding it harder to keep up with security requirements than just two years ago, risking a domino effect of dissatisfaction, burnout and eventually, resignation Continue Reading
By- Mick Baccio
-
News
22 Feb 2024
Toshiba and Orange test quantum encryption on traditional network
Researchers used QKD on a fibre-optic network spanning 184km to show how the technology could be used to secure networks cost-effectively Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Feb 2024
Inside LockBit: A ransomware gang in decline?
The LockBit ransomware gang was already on the ropes prior to the NCA-led takedown, according to security researchers Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2024
Australian data breach report highlights supply chain risks
The OAIC has called for organisations to proactively address privacy risks from outsourcing personal information handling to third parties Continue Reading
By- Aaron Tan, TechTarget
-
News
21 Feb 2024
CVE volumes set to increase 25% this year
The number of reported Common Vulnerabilities and Exposures is likely to grow significantly in 2024, hitting a new high of almost 35,000, according to Coalition, a cyber insurance specialist Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2024
SITA enhances aviation SASE with automated multi-cloud networking service
Leading IT provider in the air transport industry announces strategic collaboration with multi-cloud networking firm to gain enhanced access to secure cloud-based offerings Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Feb 2024
Assange created a ‘grave and immediate risk’, says US government, as it seeks extradition
Lawyers for the US government hit back at claims that extraditing WikiLeaks founder Julian Assange is politically motivated Continue Reading
By- Charlie Moloney
-
News
21 Feb 2024
How Indian fintechs can address compliance issues
Fintechs will need to bolster their know-your-customer practices and establish self-regulatory mechanisms, among other measures, to address compliance issues that have come under the spotlight Continue Reading
By- Kavitha Srinivasa
-
News
20 Feb 2024
LockBit locked out: Cyber community reacts
Reaction to the takedown of the LockBit ransomware gang is enthusiastic, but tempered with the knowledge that cyber criminals are often remarkably resilient Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2024
US extradition of Julian Assange is ‘state retaliation’ for exposing war crimes, court hears
Lawyers argue that the US extradition case against WikiLeaks founder Julian Assange is politically motivated and in is breach of the UK-US extradition treaty Continue Reading
By- Charlie Moloney
-
Definition
20 Feb 2024
Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information. Continue Reading
-
News
20 Feb 2024
LockBit gang members arrested in Poland and Ukraine
The UK’s National Crime Agency and its global partners have shared more details on their audacious takedown of the LockBit ransomware operation, including news of two arrests Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Feb 2024
Government agrees law to protect confidential journalistic material from state hacking
The government will update Investigatory Powers Act to require secret intelligence agencies to seek independent approval before accessing confidential journalistic material obtained by bulk hacking, but journalists remain vulnerable to other bulk surveillance powers Continue Reading
By- Bill Goodwin, Computer Weekly
-
E-Zine
20 Feb 2024
Flying into cloud – EasyJet’s journey out of the datacentre to AI
In this week’s Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There’s only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now. Continue Reading
-
News
19 Feb 2024
Cops take down LockBit ransomware gang
The notorious LockBit ransomware crew has been disrupted in an international law enforcement sting led by the UK's National Crime Agency Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
19 Feb 2024
Gartner: Three top trends in cyber security for 2024
IT security will be influenced by generative AI, identity and access management, and continuous threat exposure management Continue Reading
By- Richard Addiscott, senior director analyst and Alex Michaels, senior principal analyst at Gartner
-
News
16 Feb 2024
Poor data and IT hamper cross-government working, PAC report finds
Report cites inadequate data, poor IT systems and departmental silos as major barriers to cross-government working, and calls on government to do better Continue Reading
By -
Opinion
15 Feb 2024
Bouncing back from a cyber attack
Organisations need to move away from victim blaming when cyber attacks on OT systems occur and focus on fostering collaboration between teams to minimise downtime, among other efforts to bounce back and return to business Continue Reading
By- Marty Rickard
-
News
15 Feb 2024
WikiLeaks founder Julian Assange faces last appeal against ‘political’ extradition
WikiLeaks founder Julian Assange is seeking leave to appeal against extradition to the US in a case that could have chilling implications for journalists reporting on national security Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
15 Feb 2024
Security-by-design push prompts new ISC2 accreditations
Security-by-design has become a hot-button regulatory issue. ISC2 has decided now is the time to upskill cyber pros around these vital software and hardware development principles Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
15 Feb 2024
firewall as a service (FWaaS)
Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis capabilities to customers as part of an overall cybersecurity program. Continue Reading
By- Paul Kirvan
- Mike Chapple, University of Notre Dame
-
15 Feb 2024
Australia ups ante on cyber security
The country’s new cyber security strategy will focus on building threat-blocking capabilities, protecting critical infrastructure and improving the cyber workforce, among other priorities Continue Reading
-
E-Zine
15 Feb 2024
CW APAC: February to April 2024 – Trend Watch: CIO trends
Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India’s space missions will propel tech and Australia’s advances in cyber security. Continue Reading
-
News
14 Feb 2024
Microsoft: Nation-state hackers are exploiting ChatGPT
Threat actors from China, Iran, North Korea and Russia have all been probing use cases for generative AI service ChatGPT, but have yet to use such tools in a full-blown cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Dutch Supreme Court approves use of EncroChat evidence
Defence lawyers plan appeal to European Court of Human Rights after Supreme Court upholds a conviction based on intercepted messages from the EncroChat encrypted phone network Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Feb 2024
Southern Water customer data was taken in ransomware attack
Southern Water has started to contact customers whose data was stolen in a January 2024 ransomware attack on its systems Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Feb 2024
Met Police to scrap and replace ‘racist’ Gangs Violence Matrix
A database used by the Metropolitan Police to identify and track people linked with gang violence is being decommissioned and replaced. The decision follows a long-running controversy over its discriminatory impacts on young black people, but campaigners warn that racial discrimination will persist with new tool Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
14 Feb 2024
Microsoft patches two zero-days for Valentine’s Day
Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket, among more than 70 issues Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
14 Feb 2024
Podcast: What is the impact of AI on storage and compliance?
Start now looking at artificial intelligence compliance. That’s the advice of Mathieu Gorge of Vigitrust, who says AI governance is still immature but firms should recognise the limits and still act Continue Reading
By- Antony Adshead, Storage Editor
-
News
14 Feb 2024
Security experts: Investigatory powers plans will delay security updates
Cyber security experts warn that government proposals to amend the Investigatory Powers Act will limit tech companies’ ability to respond to security threats and could hamper the use of end-to-end encryption Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
13 Feb 2024
New variants of Qakbot malware under development
Despite its infrastructure having been taken down by the FBI last year, someone appears to be actively working on a new and improved version of the infamous Qakbot malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Feb 2024
Hunter-killer malware volumes seen surging
Latest Picus Security report on malware tactics, techniques and procedures reveals an increasing focus on disabling security defences Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
13 Feb 2024
Podcast: What are snapshots? Can they replace backup?
We talk to Shawn Meyers, field CTO at Tintri, who defines snapshots, why they are no substitute for backups, and the effect on recovery of snapshot granularity Continue Reading
By- Antony Adshead, Storage Editor
-
News
13 Feb 2024
What will result from Cohesity’s Veritas acquisition?
The $7bn backup giant will leverage huge assets in enterprise customer base, compliance and governance intelligence, AI, R&D, and Kubernetes backup and storage Continue Reading
By- Yann Serra, LeMagIT
- Antony Adshead, Storage Editor
-
E-Zine
13 Feb 2024
Intelligent defence – the role of data in the military
In this week’s Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK’s fastest supercomputer. Read the issue now. Continue Reading
-
Definition
12 Feb 2024
crisis management plan (CMP)
A crisis management plan (CMP) outlines how an organization should respond to a critical situation that if left unaddressed, could negatively affect its profitability, reputation or ability to operate. Continue Reading
By- Rahul Awati
- Nick Barney, Technology Writer
- Paul Crocetti, Executive Editor
-
Opinion
12 Feb 2024
Executives must face down state-sponsored hacking groups targeting firmware
State-backed groups have ratcheted up the pressure for cyber security professionals and executives. But that’s not an excuse to cede them the territory. Continue Reading
By- Michael Marcotte
-
Feature
12 Feb 2024
Trends driving cyber security in 2024
While cyber security breaches are not going away, emerging threats are driving new and innovative approaches to IT security Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Feb 2024
Amazon defends facial-recognition tech sale to FBI despite moratorium
The FBI has confirmed it is using Amazon’s Rekognition image and video analysis software, but Amazon says it is ‘false’ to suggest this violates the company’s self-imposed moratorium on selling facial-recognition technology to US police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
09 Feb 2024
MoD ethical hacking programme expands after initial success
The Ministry of Defence has expanded the scope of its defensive security partnership with HackerOne Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
09 Feb 2024
cyberterrorism
Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. Continue Reading
-
Definition
09 Feb 2024
mobile security (wireless security)
Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Continue Reading
By- Kinza Yasar, Technical Writer
- Brien Posey
- Ivy Wigmore
-
News
08 Feb 2024
Why open data is needed in the battle to address homelessness
Centrepoint needed to send FOIs to more than 300 local authorities in England to access required information Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
08 Feb 2024
ICD-10-PCS (International Classification of Diseases, 10th Revision, Procedure Coding System)
The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is an American adaptation of the World Health Organization's ICD-10 system, tailored for procedural coding in inpatient and hospital settings. Continue Reading
-
News
08 Feb 2024
CIO interview: Sandy Venugopal, SentinelOne
We speak to the former CIO of Uber and LinkedIn, current CIO of SentinelOne, about how artificial intelligence should be deployed in business Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 Feb 2024
Executive alleged to be behind EncroChat encrypted phone network arrested
A businessman allegedly behind EncroChat, an encrypted phone network that was used by organised crime groups, has been extradited from the Dominican Republic to France Continue Reading
By- Bill Goodwin, Computer Weekly
-
Definition
08 Feb 2024
clinical decision support system (CDSS)
A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and improve patient care. Continue Reading
By- Rahul Awati
- Megan Charles
- Alex DelVecchio, Content Development Strategist
-
News
07 Feb 2024
NCSC warns CNI operators over ‘living-off-the-land’ attacks
Malicious, state-backed actors may well be lurking in the UK’s most critical networks right now, and their operators may not even know until it is too late, warn the NCSC and its partners Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2024
Dozens of surveillance companies are supplying spyware to governments, says Google
Google’s Threat Analysis Group has identified 40 companies involved in selling and supplying security exploits and spyware services to governments Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
07 Feb 2024
Security Think Tank: The phishing forecast for 2024
Egress' Jack Chapman and James Dyer explore how phishing attacks are set to grow in their scope and sophistication this year, with generative AI playing a big role Continue Reading
By- Jack Chapman and James Dyer
-
Definition
07 Feb 2024
keylogger (keystroke logger or system monitor)
A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific device, such as a computer or smartphone. Continue Reading
By- Rahul Awati
- Alexander S. Gillis, Technical Writer and Editor
-
News
07 Feb 2024
How Iranian cyber ops pivoted to target Israel after 7 October attacks
Microsoft has shared new intelligence on how Iranian government-aligned threat actors have turned their fire on Israel over the past four months Continue Reading
By- Alex Scroxton, Security Editor
-
News
07 Feb 2024
South Staffs Water faces group action over Clop ransomware attack
South Staffordshire Plc, the parent company of South Staffordshire and Cambridge Water, is facing legal action from customers whose data was compromised in a 2022 Clop ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
07 Feb 2024
encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning. Continue Reading
By- Robert Sheldon
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
News
07 Feb 2024
AI ID specialist Onfido in talks to be bought by Entrust
UK-based cyber unicorn Onfido agrees to enter talks to be acquired by Entrust Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Feb 2024
UK’s McPartland Cyber Review to probe trust in technology
The UK government has launched a cyber security review that will investigate how best to give businesses the confidence they need to use new technologies Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
06 Feb 2024
8 dangers of shadow IT and how to manage them
Unauthorized devices, software and system changes -- and other forms of shadow IT -- can expose organizations to a range of security risks. Here are ways to manage them. Continue Reading
By -
News
06 Feb 2024
Inquiry to explore cyber risk to Sunak-Starmer showdown
The UK’s Joint Committee on National Security Strategy is opening an inquiry into securing the democratic process ahead of the next general election Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
06 Feb 2024
dictionary attack
A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary, or word list, as a password. Continue Reading
By -
News
06 Feb 2024
UK and France push for international agreement on spyware
The UK and France are hosting diplomats, big tech companies and civil society groups, in a two-day conference in London targeting the proliferation of spyware tools and ‘hackers for hire’ Continue Reading
By- Bill Goodwin, Computer Weekly
-
Opinion
06 Feb 2024
Three predictions for responding to the cyber threat landscape in 2024
Nominet's Kim Wiles looks to the coming months and calls for cooperation and collaboration on tackling cyber security threats Continue Reading
By- Kim Wiles
-
E-Zine
06 Feb 2024
Generative AI – an early adopter’s experience
In this week’s Computer Weekly, as IT leaders start to implement GenAI in their organisations, we look at the experiences of one early adopter. Our latest buyer’s guide examines the key security trends for 2024. And Microsoft’s head of identity talks about a future without passwords. Read the issue now. Continue Reading
-
Definition
05 Feb 2024
ICD-10 (International Classification of Diseases, 10th Revision)
The International Classification of Diseases, 10th Revision (ICD-10), is a global standard for classifying and coding mortality and morbidity data. Continue Reading
By- Robert Sheldon
- Tayla Holman, Site Editor
-
05 Feb 2024
IT security strategy: Assessing the risks of generative AI
Most industry watchers see 2024 as the year when generative artificial intelligence and large language models will begin moving into enterprise IT. We consider the security implications. Continue Reading
-
Definition
05 Feb 2024
personal health record (PHR)
A personal health record (PHR) is an electronic summary of health information that a patient maintains control of themselves, as opposed to their healthcare provider. Continue Reading
By- Katie Terrell Hanna
- Kristen Lee, News Writer
-
News
05 Feb 2024
Blackbaud blasted for failing to prevent customer breaches
A supply chain attack at software supplier Blackbaud in 2020 saw data on multiple UK organisations compromised. The US authorities are now taking steps to ensure it can’t happen again Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Feb 2024
US sanctions Iranians behind CNI cyber attacks
US government issues new sanctions against six Iranians suspected of being behind a series of cyber attacks targeting critical national infrastructure, notably water supply systems Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
05 Feb 2024
New Optimisation Kid On The Block Puts Hybrid Users On The Cloudbrink Of Performance...
As many of you will know, one of my major focus areas since Stone Age Man (almost) has been network optimisation in its broadest sense. It seems ironic that, in 2024, optimisation is required more ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Feature
05 Feb 2024
IT security strategy: Assessing the risks of generative AI
Most industry watchers see 2024 as the year when generative AI and large language models will begin moving into enterprise IT Continue Reading
By- Cliff Saran, Managing Editor
- Adrian Bridgwater
-
Feature
02 Feb 2024
UK police facial recognition explained: What you need to know
In this essential guide, Computer Weekly looks at the use of facial recognition technology by UK police forces, including the points of contention around its deployment so far and where it’s heading next Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Feb 2024
AI: House of Lords focuses on copyright and transparency
Large language models promise to boost UK productivity, but the tech needs greater scrutiny and questions remain over intellectual property Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Feb 2024
US government disrupts Chinese botnet containing hundreds of end-of-life Cisco and Netgear routers
The US government has succeeded in halting a botnet comprised of hundreds of end-of-life routers that posed a threat to critical national infrastructure (CNI) organisations in multiple countries Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
01 Feb 2024
Welsh workers’ AI experiences shaped by uneven power dynamics
Workers in Wales are being negatively affected by the unregulated introduction of artificial intelligence into workplaces due to asymmetric power dynamics Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
01 Feb 2024
Defra legacy IT: 180 applications refreshed, over 1,500 remain
The Department for Environment, Food and Rural Affairs has a 10-year plan to update technology. So far, 180 have been replaced or updated Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
31 Jan 2024
consumer data
Consumer data is the information that organizations collect from individuals who use internet-connected platforms, including websites, social media networks, mobile apps, text messaging apps or email systems. Continue Reading
-
Opinion
31 Jan 2024
AI everywhere all at once
Artificial intelligence became mainstream in 2023. Advances in technology and accessibility led to increased awareness and use of AI Continue Reading
By- Resham Kotecha
-
Definition
31 Jan 2024
security operations center (SOC)
A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks. Continue Reading
-
Blog Post
31 Jan 2024
SASE Evaluation - The Thoughts Of A Founding Father
Now here’s something a little different. On this ‘ere blog, you are used to hearing my views on the world of networking, comms, security and occasionally wine. You may also have read my recent ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Blog Post
31 Jan 2024
Low Code Hits New High - Results Of A New Survey
Had a really interesting conversation the other day with Adrian Bignall, he who is in charge of International Sales at Evoke Technologies. Evoke is a rather large tech consultancy that only ... Continue Reading
By- Steve Broadhead, Broadband Testing
-
Opinion
30 Jan 2024
Microsoft hack: Five questions enterprises should ask their IT leaders
Following the news about a Russia-backed hacking group infiltrating Microsoft's systems, enterprises may want to seek assurances from their IT and security leaders about the implications of the attack for them Continue Reading
By- Owen Sayers, Secon Solutions
-
News
30 Jan 2024
We need backup! Pennsylvania police data loss shows why
Police evidence systems data was lost during ‘routine maintenance’, with human error blamed – the case clearly illustrates why data protection can’t be left to chance Continue Reading
By- Antony Adshead, Storage Editor
-
30 Jan 2024
Chat control: Tech companies warn ministers over EU encryption plans
Tech companies have written to EU ministers to urge them to back the European Parliament, rather than the European Commission, over proposed regulations to police child abuse. Continue Reading
-
E-Zine
30 Jan 2024
Tech companies warn EU over encryption plans
In this week’s Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody’s about why it thinks now is the time to start investing in quantum computing. And we examine how a different approach to recruitment could ease the datacentre sector skills gap. Read the issue now. Continue Reading
-
Definition
29 Jan 2024
indicators of compromise (IOC)
Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor. Continue Reading
By- Robert Sheldon
- Madelyn Bacon, TechTarget
-
Feature
29 Jan 2024
Top 10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading
-
News
29 Jan 2024
Lords question legality of police facial recognition
Lords committee ‘deeply concerned’ about the rapid expansion of live facial recognition by UK police, which it says is progressing without any real oversight or accountability Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
29 Jan 2024
What developers need to know about LLMs in the enterprise
We look at the main areas enterprise developers need to consider when building, testing and deploying enterprise applications powered by large language models Continue Reading
By- Cliff Saran, Managing Editor
- Adrian Bridgwater